You are on page 1of 3

1. Encryption/decryption belongs to which domain of the CBK?

A) Security Architecture and Models B) Business Continuity Planning C) Cryptography D) Operations Security Feedback: See Page 352. Correct Answer(s): C 2. Redirecting an internet user from a legitimate site to a malicious Web site for the purpose of harvesting user IDs and passwords is referred to as: A) Scamming B) Slamming C) Phishing D) Pharming Correct Answer(s): D

3. Which of the following is NOT a well known vendor of antivirus software? A) Network Associates B) Symantec C) F-Secure D) Adobe Correct Answer(s): D

4. All of the following are threats by the insider to network use and security exce pt: A) Internet usage B) Built-in email controls C) Instant messaging D) Use of thumb drives threatens intellectual property. Correct Answer(s): B

5. Intrusion-detection, a type of detective control which belongs to which of the f ollowing CBK domains? A) Physical Security B) Operations Security C) Cryptography D) Law, Investigations, and Ethics Feedback: See page 348. Correct Answer(s): B 6. Virtual Private Networks (VPNs) belongs to which domain of the CBK? A) Physical Security B) Telecommunications, Network and Internet Security C) Access Control Systems and Methodology

D) Security Management Practices Feedback: See page 355. Correct Answer(s): B 7. The OSI Model is a key area knowledge for which of the following domains of the CBK? A) Security Architecture and Models B) Law, Investigations, and Ethics C) Access Control Systems and Methodology D) Operations Security Feedback: See page 355. Correct Answer(s): A 8. CGI Scripting belongs to which domain of the CBK? A) Operations Security B) Law, Investigations, and Ethics C) Application Development Security D) Access Control Systems and Methodology Feedback: See page 358. Correct Answer(s): C 9. A Cold-site A) Physical B) Security C) Business D) Security

facility belongs to which domain of the CBK? Security Management Practices Continuity Planning Architecture and Models

Feedback: See page 337. Correct Answer(s): C 10. Perimeter alarm systems belongs to which domain of the CBK? A) Operations Security B) Physical Security C) Access Control Systems and Methodology D) Security Management Practices Feedback: See page 344. Correct Answer(s): B 11. Software copyrighting belongs to which domain of the CBK? A) Law, Investigations, and Ethics B) Cryptography C) Business Continuity Planning D) Telecommunications, Network and Internet Security Feedback: See page 341. Correct Answer(s): A

12. Retina scanning belongs to which domain of the CBK? A) Law, Investigations, and Ethics B) Law, Investigations, and Ethics C) Operations security D) Access Control Systems and Methodology Feedback: See page 350. Correct Answer(s): D 13. Risk assessment belongs to which domain of the CBK? A) Physical Security B) Security Management Practices C) Telecommunications, Network, and Internet Security D) Law, Investigations, and Ethics Feedback: See pages 334 and 335. Correct Answer(s): B

You might also like